Research seminar course - provisional assignment of papers | ||||
Week # | Talk # | Student | Mentor | Paper |
2 | 2.1 | David Birch | Paul | Interactive Geometric Simulation of 4D Cities |
Basil Weber, Pascal Mueller, Peter Wonka and Markus Gross | ||||
3 | 3.1 | Xiuyu Fan | Herbert | What errors do peer-reviewers detect? |
Sara Schroter, Nick Black et al J R Soc Med 2008 101:507-514. http://jrsm.rsmjournals.com/cgi/content/full/101/10/507 (access on-campus or via VPN only) | ||||
3 | 3.2 | Michael Lange | Uli | Zonal methods for the parallel execution of range-limited N-body simulations |
Bowers, Dror, Shaw; J. Comput. Phys. 221, 1 (Jan. 2007), 303-329. DOI= http://dx.doi.org/10.1016/j.jcp.2006.06.014 | ||||
4 | 4.1 | Cancelled | Paul | Cancelled - likely to be filled with a talk from later in the schedule |
4 | 4.2 | Dianhuan Lin | Herbert | Causality in Action Theories |
Camilla Schwind, Electronic Transactions on Artificial Intelligence, Vol. 3 (1999), Section A, pp. 27-50. http://www.ep.liu.se/ej/etai/1999/007/. See discussion at http://www.ida.liu.se/ext/etai/ra/rac/018/rppf.html | ||||
5 | 5.1 | Andrew Jones | Uli | The Effect of Tossing Coins in Omega-Automata |
Christel Baier, Nathalie
Bertrand, Marcus Groesser: Proc. of the 20th International Conference on
Concurrency Theory (CONCUR > '09), Lecture Notes in Computer Science, Volume 5710 pp. 15-29, 2009 http://dx.doi.org/10.1007/978-3-642-04081-8_2 |
||||
5 | 5.2 | Jun Jiao | Paul | Interactive Digital Photomontage. |
Aseem Agarwala, Mira Dontcheva, Maneesh Agrawala, Steven Drucker, Alex Colburn, Brian Curless, David Salesin, Michael Cohen. ACM Transactions on Graphics (Proceedings of SIGGRAPH 2004), 2004. http://grail.cs.washington.edu/projects/photomontage/ | ||||
6 | 6.1 | Faris Abou-Saleh | Herbert | A Dynamic logical perspective on quantum behaviour - Baltag and Smets, 2008 - http://www.springerlink.com/content/5733821v37674231/ |
6 | 6.2 | Will Jones | Uli | On the (Im)possibility of Obfuscating Programs |
Boaz Barak, Oded Goldreich, Russell Impagliazzo, Steven Rudich, Amit Sahai, Salil Vadhan, Ke Yang: | ||||
Proc. of Advances in Cryptology - CRYPTO `01, Lecture Notes in Computer Science, Volume 2139, pp. 1-18, 2001. http://www.math.ias.edu/~boaz/Papers/obfuscate.html | ||||
We will be reading the conference paper http://www.springerlink.com/content/telalqdcx3n600uf/ - but see the other versions (longer might be easier), presentations and discussion | ||||
7 | 7.1 | Huaxin Wang | Paul | Dynamic Instruction Reuse |
Sodani & Sohi, 1997 - ftp://ftp.cs.wisc.edu/sohi/papers/1997/isca.inst-reuse.pdf | ||||
7 | 7.2 | Victor Faion | Herbert | Software watermarking in the frequency domain: Implementation, analysis, and attacks |
Journal of Computer Security, Volume 13, Issue 5, http://iospress.metapress.com/content/4m5d4q72wlabc9cl/ (there are known problems with accessing this site) | ||||
8 | 8.1 | Ognjen Rudovic | Uli | Does the h index have predictive power? |
J. E. Hirsch. Proceedings of the National Academy of Science, December 4, 2007 vol. 104 no. 49 19193-19198. http://www.pnas.org/content/104/49/19193.abstract | ||||
8 | 8.2 | Anton Stefanek | Paul | Making Lockless Synchronization Fast: Performance Implications of Memory Reclamation |
Hart, McKenney, and Demke Brown (2006). <http://www.rdrop.com/users/paulmck/RCU/hart_ipdps06.pdf>/ An IPDPS 2006 Best Paper <http://www.ipdps.org/ipdps2006/2006_advance_program.html> | ||||
9 | 9.1 | Barnaby Malet | Herbert | Transforming out timing leaks |
Johan Agat. Proc. of the 27th Symposium on Principles of programming languages Boston, MA, USA pp 40 - 53, 2000 http://doi.acm.org/10.1145/325694.325702 | ||||
9 | 9.2 | Nicholas Ball | Uli | Producing Wrong data without doing anything obviously wrong |
Diwan, Hauswirth & Sweeney 2009 - http://www-plan.cs.colorado.edu/diwan/asplos09.pdf | ||||
10 | 10.1 | |||
10 | 10.2 | |||
11 | 11.1 |